Given that the attacker has the side information of adaptivity criterion, it is an urgent problem for the steganographer to improve the security of large-payload and adaptive steganography.This paper proposed a game-theoretic model for the two sides.Through theoretical derivation, we provided the necessary conditions for game equilibrium, along with the mixed strategies and expected payoffs of the two sides in equilibrium.Results of numerical simulation validated the theoretical analysis.This research reveals that the attacker's strategy is independent of the number of hidden bits, and the expected payoff increases with the number of hidden bits.The probability that one position is selected by steganographer to embed more bits is always greater than zero and increases with the complexity of that position.These conclusions bring some guidance for devising secure adaptive steganography with large payload.
刘静, 汤光明. 大容量自适应隐写对抗的博弈研究[J]. 电子学报, 2014, 42(10): 1963-1969.
LIU Jing, TANG Guang-ming. Game Research on Large-Payload and Adaptive Steganographic Counterwork. Chinese Journal of Electronics, 2014, 42(10): 1963-1969.
[1] 郭云彪,尤新刚,张春田,周琳娜.面向信息隐藏的图像复杂度研究[J].电子学报,2006,34(6):1048-1052. Guo Yun-biao,You Xin-gang,Zhang Chun-tian,Zhou Lin-na.Study of image bit-plane complexity in the information hiding[J].Acta Electronica Sinica,2006,34(6):1048-1052.(in Chinese)
[2] H C Wu,N I Wu,C S Tsai,M S Hwang.Image steganographic scheme based on pixel-value differencing and LSB replacement methods[J].IEE Proceedings-Vision,Image and Signal Processing,2005,152(5):611-615.
[3] B Nguyen,S Yoon,H Lee.Multi bit plane image steganography[A].Proceedings of International Workshop on Digital Watermarking[C].Berlin:Springer,2006.61-70.
[4] C H Yang,C Y Weng,S J Wang,H M Sun.Adaptive data hiding in edge areas of images with spatial LSB domain systems[J].IEEE Transactions on Information Forensics and Security,2008,3(3):488-497.
[5] 戴跃伟,刘光杰,叶曙光.基于Hilbert填充曲线的自适应隐写[J].电子学报,2008,36(12A):35-38. Dai Yue-wei,Liu Guang-jie,Ye Shu-guang.Adaptive steganography based on Hilbert filling curve[J].Acta Electronica Sinica,2008,36(12A):35-38.(in Chinese)
[6] W Hong.Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique[J].Information Sciences,2013,221(1):473-489.
[7] E Franz.Steganography preserving statistics properties[A].Proceedings of 5th International Workshop on Information Hiding[C].Noordwijkerhout:Springer,2002.278-294.
[8] W Luo,F Huang,J Huang.Edge adaptive image steganography based on LSB matching revisited[J].IEEE Transaction on Information Forensics and Security,2010,5(2):201-214.
[9] W Luo,F Huang,J Huang.A more secure steganography based on adaptive pixel-value differencing scheme[J].Multimed Tools Application,2011,52(2-3):407-430.
[10] T Pevny,T Filler,Bas P.Using high-dimensional image models to perform highly undetectable steganography[A].Proceedings of 12th International Conference on Information Hiding[C].Calgary:Springer,2010.161-177.
[11] T Filler,J Fridrich.Design of adaptive steganographic schemes for digital images[A].Proceedings of SPIE,Electronic Imaging,Security and Forensics of Multimedia XIII[C].San Francisco:SPIE,2011.1-14.
[12] 张良.一种基于幅度预测的隐写分析方法[J].电子学报,2010,38(11):2704-2707. Zhang liang.A steganalysis scheme using magnitude prediction[J].Acta Electronica Sinica,2010,38(11):2704-2707.(in Chinese)
[13] 毛家发,钮心忻,杨义先,时书剑.基于JPEG净图定量描述的隐写分析方法[J].电子学报,2011,39(8):1907-1912. Mao Jia-fa,Niu Xin-xin,Yang Yi-xian,Shi Shu-jian.Steganalysis method based on JPEG cover image quantitative describing[J].Acta Electronica Sinica,2011,39(8):1907-1912.(in Chinese)
[14] R Böhme,A Westfeld.Exploiting preserved statistics for steganalysis[A].Proceedings of 6th International Workshop on Information Hiding[C].Toronto:Springer,2004.82-96.
[15] S Tan,B Li.Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting[J].IEEE Signal Processing Letters,2012,19(6):336-339.
[16] P Schöttle,R Böhme.A game-theoretic approach to content-adaptive steganography[A].Proceedings of 14th International Conference on Information Hiding[C].Berkeley:Springer,2012.125-141. [LL]
[17] B Johnson,P Schöttle,R Böhme.Where to hide the bits?[A].Proceedings of Third International Conference on Decision and Game Theory for Security[C].Budapest:Springer,2012.1-17.
[18] A D Ker.Steganalysis of embedding in two least-significant bits[J].IEEE Transactions on Information Forensics and Security,2007,2(1):46-14.
[19] 罗向阳,刘粉林,杨春芳,廉士国.一类自适应隐写的更改比率估计[J].中国科学:信息科学,2011,41(3):297-310. Luo Xiang-yang,Liu Fen-Lin,Yang Chun-fang,Lian Shi-guo.Modification ratio estimation for a category of adaptive steganography[J].Science China:Information Sciences,2011,41(3):297-310.(in Chinese)
[20] Fridrich J.Steganography in Digital Media:Principles,Algorithms,and Applications(1st Ed)[M].New York:Cambridge University Press,2009.10-12.g F, Huang J. A more secure steganography based on adaptive pixel-value differencing scheme[J]. Multimed Tools Appl, 2011, 52(2-3):407-430.
[9] Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[C]. Proceedings of 12th International Conference on Information Hiding, Calgary, 2010, LNCS 6387: 161-177.
[10] Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images[C]. Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, San Francisco, 2011, vol. 7880: 1-14.
[11] B?hme R, Westfeld. A. Exploiting preserved statistics for steganalysis[C]. Proceedings of 6th International Workshop on Information Hiding, Toronto, 2004, LNCS 3200: 82-96.
[12] Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline Fitting[J]. IEEE Siganl Processing Letters, 2012, 19(6): 336-339.
[13] Sch?ttle P, B?hme R. A Game-Theoretic Approach to Content-Adaptive Steganography[C]. Proceedings of 14th International Conference on Information Hiding, Berkeley, 2012, LNCS 7692: 125-141.
[14] Johnson B, Sch?ttle P, B?hme R. Where to hide the bits?[C]. Proceedings of Third International Conference Decision and Game Theory for Security, Budapest, 2012, LNCS 7638: 1-17.
[15] Gauvain J L, Lee C H. Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains[J]. IEEE Transactions on Speech and Audio Processing, 1994, 2(2): 291-298.
[16] Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications[M]. 1st edn. New York: Cambridge University Press, 2009: 10-12.